Zero Trust Architecture: Trend and Impacton Information Security

9Citations
Citations of this article
106Readers
Mendeley users who have this article in their library.

Abstract

Traditional-based security models are a threat to information security; they have been regarded as weak and ineffective to meet the dynamics of information system trust. An emerging framework, Zero Trust Architecture (ZTA) seeks to close the trust gap in information security through enforcing policies based on identity and continuous authentication and verification. This framework is built on several trust nodes and logical components that attempt to close the trust gap that exists in an information system. The adoption of this framework is still in its teething stage which is a result of several misleading deductions and assumptions. We attempt to explore the intricacies in the framework and close the existing knowledge gap. we surveyed the literature on ZTA and provided a foundational discussion on its implementation and effectiveness from prior studies. while we do not critique other models, this paper studied the strength and variables of the zero-trust security architecture and attempt to provide an overview of the model and close the knowledge gap on the effectiveness of adopting a Zero trust philosophy.

Cite

CITATION STYLE

APA

Edo, O. C., Tenebe, T., Etu, E., Ayuwu, A., Emakhu, J., & Adebiyi, S. (2022). Zero Trust Architecture: Trend and Impacton Information Security. International Journal of Emerging Technology and Advanced Engineering, 12(7), 140–147. https://doi.org/10.46338/ijetae0722_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free